SlideShare a Scribd company logo
Comp tia security sy0 601 domain 3 implementation
www.infosectrain.com | sales@infosectrain.com 01
The latest version of
Security+ SY0-601 have 5 Domains:
Domain 1.0: Attacks, Threats, and Vulnerabilities (24%)
Domain 2.0: Architecture and Design (21%)
Domain 3.0: Implementation (25%)
Domain 4.0: Operations and Incident Response (16%)
Domain 5.0: Governance, Risk, and Compliance (14%)
In this blog, we discuss the second domain 3: Implementation
www.infosectrain.com | sales@infosectrain.com 02
Implementation
D O M A I N 3
For a company’s security program, implementation is critical. It is
the point at which a security system or technology comes into
being, a new security effort is nothing but a collection of thoughts
on a document if it isn’t put into action. In this domain, we cover 9
objectives and their subtopics.
The objectives covered in security+ domain 3.0 are listed below.
1. Implement Secure Protocols
2. Implement Host or Application Security Solutions
3. Implement Secure Network Designs
4. Install and Configure Wireless Security Settings
5. Implement Secure Mobile Solutions
6. Apply Cybersecurity Solutions to the Cloud
7. Implement Identity and Account Management Controls
8. Implement Authentication and Authorization Solutions
9. Implement Public Key Infrastructure
www.infosectrain.com | sales@infosectrain.com 03
Implement Secure Protocols
01
Cyber attackers can take advantage of insecure protocols to
damage data security and the integrity of systems. In this lesson,
you’ll learn about some of the protocols and services that provide
network hosts with addressing, name resolution, and monitoring.
These protocols aren’t as visible as apps like web servers and email
servers, but they’re essential for securing networks.
This lesson covers two parts: Protocols and Use case. Inside
Protocols we learn Domain Name System (DNS), DNS Security
Extensions (DNSSEC), Secure Real-time Transport Protocol (SRTP),
File Transfer Protocol (FTPS), SSH File Transfer Protocols (SFTP),
Understand Simple Network Management Protocol (SNMP)
framework, Hypertext Transfer Protocol (HTTP), we can cover email
service protocols, secure POP3 (Post Office Protocol v3), Secure IMAP
(Internet Message Access Protocol v4). We understand Internet
Protocol Security (IPSec) and its 2 Protocols:
In Use case part we learn how security protocols
work inside this we cover:
• Authentication Header (AH)
• Encapsulation Security Payload (ESP)
• Voice and Video
• Time Synchronization
• Email and Web
• File Transfer
• Directory Services
• Remote Access
• Domain Name Resolution
• Routing and Switching
• Network Address Allocation
• Subscription Services
www.infosectrain.com | sales@infosectrain.com 04
Implement Host or Application
Security Solutions
02
This lesson is concentrated on which security solutions are
implemented for various hosts and applications. Inside this
lesson, we cover Endpoint Protection, Boot Integrity, Application
Security, Hardening.
In Endpoint Protection we can understand Antivirus and Anti-
Malware, NGFW (Next-generation firewall), Host-based intrusion
detection system (HIDS), Endpoint detection and response
(EDR), Data Loss Prevention (DLP). Boot Integrity covers Boot
Security, Unified Extension Firmware Interface (UEFI), work of
Measured boot and Boot Attestation.
Inside Application security we learn Input Validation, Secure
Cookies, HTTP Headers, we understand Allow list, Block list,
Dynamic Code analysis.
www.infosectrain.com | sales@infosectrain.com 05
Implement Secure
Network Designs
03
Networks are as prevalent in the business as computers
themselves. As a result, understanding secure network designs is
essential for creating a protected network for your company. In this
lesson we understand the working of Load balancing, Network
segmentation, Virtual local area network (VLAN), we learn the
difference between Extranet and Intranet. Cover the working of VPN
(Virtual Private Network), DNA, also cover Network access control
(NAC), Access control list (ACL). We will also understand the use of
Port security.
www.infosectrain.com | sales@infosectrain.com 06
Install and Configure
Wireless Security Settings
04
Wireless security is becoming very important in the field of
information security. In this lesson, we learn Cryptographic
protocols, WiFi protected Access 2 (WAP2) and WiFi protected
access 3 (WAP3), Simultaneous Authentication of Equals (SAE). We
also cover Authentication protocols, Extensible authentication
protocol (EAP), Protected Extensible Authentication Protocol (PEAP),
IEEE 802.1X. We understand the Methods of configuring wireless
security and Installation considerations, WiFi Protected Setup (WPS),
Site surveys, WiFi analyzers, Wireless access point (WAP) placement.
www.infosectrain.com | sales@infosectrain.com 07
Implement Secure
Mobile Solutions
05
In this lesson, we will understand the concept of Connection
methods and receivers. Inside this concept, we cover Cellular, WiFi,
Bluetooth, NFC, Infrared, Point to Point, Point to multipoint. We learn
Mobile device management (MDM), Application management,
Content management, Remote wipe, Geofencing, Screen lock,
Biometrics, Storage segmentation. We cover Deployment models,
BYOD (Bring your own device), Corporate-owned personally
enabled (COPE), Choose your own device (CYOD), Virtual desktop
infrastructure (VDI).
www.infosectrain.com | sales@infosectrain.com 08
Apply Cybersecurity
Solutions to the Cloud
06
In this lesson, we will learn the use of Cloud security controls,
Cybersecurity solutions, and Cloud-native controls vs third-party
solutions. In Cloud Security controls we will cover several sub-topics
like High availability across zones, Storage, Network, Compute. And
inside Cybersecurity solutions, we cover Application security,
Next-generation secure web gateway (SWG), Firewall
considerations in a cloud environment.
www.infosectrain.com | sales@infosectrain.com 09
Implement Identity and
Account Management Controls
07
In this lesson, we will learn 3 topics: Identity, Account types, and
Account policies. In the first topic Identity, we cover Identity
providers (IdP), know about Identity Attributes, how the tokens are
used, SSH keys, and Smart cards. In the second topic, we cover
types of accounts, User account, Guest accounts, Service accounts.
Inside Account policies, we cover Account permissions, Access
policies, Password complexity, Time-based logins, Account audits.
www.infosectrain.com | sales@infosectrain.com 10
Implement Authentication
and Authorization Solutions
08
In this lesson, we will learn Authentication management, Password
keys, Password vaults, TPM, Knowledge-based authentication. We
will cover Authentication/authorization, inside this topic we will
understand Challenge-Handshake Authentication Protocol (CHAP),
Password Authentication Protocol (PAP), Terminal Access Controller
Access Control System Plus (TACACS+), Kerberos, OpenID. We also
cover Access control schemes and their subtopics Attribute-based
access control (ABAC), Role-based access control, Rule-based
access control, Privileged access management, Filesystem
permissions.
www.infosectrain.com | sales@infosectrain.com 11
Implement Public
Key Infrastructure
09
In this lesson, we will cover the concept of Public key infrastructure
(PKI), Key management, Certificate authority (CA), Certificate
revocation list (CRL), use of Certificate attributes, Online Certificate
Status Protocol (OCSP), Certificate signing request (CSR). We learn
types of certificates, Wildcard, Subject alternative name, Code
signing, Domain Validation, Extended validation. We also cover
formats of certification and Concepts of certification changing, Key
escrow, online vs offline CA.
www.infosectrain.com | sales@infosectrain.com

More Related Content

PDF
Comptia security sy0 601 domain 4 operation and incident response
PDF
Information Security Analyst- Infosec train
PDF
CISA Domain 4 Information Systems Operation | Infosectrain
PPTX
CMMC rollout: How CMMC will impact your organization
PDF
CompTIA cysa+ certification changes: Everything you need to know
PPTX
Isaca career paths - the highest paying certifications in the industry
PDF
CMMC case study: Inside a CMMC assessment
PDF
Cdpse course content infosec train
Comptia security sy0 601 domain 4 operation and incident response
Information Security Analyst- Infosec train
CISA Domain 4 Information Systems Operation | Infosectrain
CMMC rollout: How CMMC will impact your organization
CompTIA cysa+ certification changes: Everything you need to know
Isaca career paths - the highest paying certifications in the industry
CMMC case study: Inside a CMMC assessment
Cdpse course content infosec train

What's hot (19)

PPT
2008: Web Application Security Tutorial
PDF
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
PPTX
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
PDF
Cyber security maturity model- IT/ITES
PDF
IT SECURITY ASSESSMENT PROPOSAL
PDF
Business case for information security program
PDF
System of security controls
PDF
Assessing Risk: Developing a Client/Server Security Architecture,
PDF
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
PDF
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
PDF
IT Network Security Services
PDF
Governance of security operation centers
PPTX
Proposal for IT Security Team
PPTX
Scott Hogg - Gtri cloud security knowledge and certs
PDF
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
PPTX
Security Operation Center Fundamental
PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
Lessons Learned from the NIST CSF
PDF
Building a Product Security Practice in a DevOps World
2008: Web Application Security Tutorial
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Cyber security maturity model- IT/ITES
IT SECURITY ASSESSMENT PROPOSAL
Business case for information security program
System of security controls
Assessing Risk: Developing a Client/Server Security Architecture,
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
IT Network Security Services
Governance of security operation centers
Proposal for IT Security Team
Scott Hogg - Gtri cloud security knowledge and certs
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
Security Operation Center Fundamental
Cybersecurity roadmap : Global healthcare security architecture
Lessons Learned from the NIST CSF
Building a Product Security Practice in a DevOps World
Ad

Similar to Comp tia security sy0 601 domain 3 implementation (20)

PDF
CompTIA Security+ SY0-601 Domain 2
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PDF
cissp-course content.pdf & cissp description
PDF
CISSP _Course _Description and course overview
PDF
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
PDF
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
PDF
Security+ SY0-701 CERTIFICATION TRAINING.pdf
PDF
CompTIA_Security_plus_SY0-701_course_content.pdf
PDF
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
PDF
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
PDF
CompTIA Security+ (Plus) Certification Training Course
PDF
CompTIA_Security_plus_SY0-701_course_content.pdf
PDF
CISSP Preview - For the next generation of Security Leaders
PDF
CISSP Certification Training By Edvistaar
PPTX
starting a career in cyber security in 2025.pptx
PDF
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
PPTX
Starting your Career in Information Security
PDF
Network Security Certification
PDF
(eBook PDF) Information Security: Principles and Practices 2nd Edition
CompTIA Security+ SY0-601 Domain 2
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
cissp-course content.pdf & cissp description
CISSP _Course _Description and course overview
Explore the comprehensive CISSP Certification Course syllabus with InfosecTra...
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
Security+ SY0-701 CERTIFICATION TRAINING.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
CompTIA Security+ (Plus) Certification Training Course
CompTIA_Security_plus_SY0-701_course_content.pdf
CISSP Preview - For the next generation of Security Leaders
CISSP Certification Training By Edvistaar
starting a career in cyber security in 2025.pptx
CompTIA Security+ All in One Exam Guide, Fifth Edition (Exam SY0 501) 5th Edi...
Starting your Career in Information Security
Network Security Certification
(eBook PDF) Information Security: Principles and Practices 2nd Edition
Ad

More from ShivamSharma909 (20)

PDF
Ethical Hacking Interview Questions and Answers.pdf
PDF
CYBERSECURITY Interview Questions for Freshers.pdf
PDF
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
PDF
Top 20 Incident Responder Interview Questions and Answers (1).pdf
PDF
Top 25 Azure Architect Interview Questions and Answers.pdf
PDF
Top 20 Azure Administrator Interview Questions.pdf
PDF
Threat Hunting Professional Online Training Course
PDF
Why cloud security engineers find CCSE as a perfect fit
PDF
Top 20 certified ethical hacker interview questions and answer
PDF
Top 20 azure interview questions
PDF
Top 15 aws security interview questions
PDF
EC-Council Certified SOC Analyst
PDF
Ctia course outline
PDF
Domain 6 of CEH: Wireless Network Hacking
PDF
Domain 5 of the CEH: Web Application Hacking
PDF
Domain 4 of CEH V11: Network and Perimeter Hacking
PDF
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
PDF
Domain 2 of CEH v11: Reconnaissance Techniques
PDF
Domain 1 of CEH v11: Information Security and Ethical Hacking
PDF
How is az 303 different from az-304
Ethical Hacking Interview Questions and Answers.pdf
CYBERSECURITY Interview Questions for Freshers.pdf
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 20 Azure Administrator Interview Questions.pdf
Threat Hunting Professional Online Training Course
Why cloud security engineers find CCSE as a perfect fit
Top 20 certified ethical hacker interview questions and answer
Top 20 azure interview questions
Top 15 aws security interview questions
EC-Council Certified SOC Analyst
Ctia course outline
Domain 6 of CEH: Wireless Network Hacking
Domain 5 of the CEH: Web Application Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 1 of CEH v11: Information Security and Ethical Hacking
How is az 303 different from az-304

Recently uploaded (20)

PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Pharma ospi slides which help in ospi learning
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Module 4: Burden of Disease Tutorial Slides S2 2025
O5-L3 Freight Transport Ops (International) V1.pdf
Complications of Minimal Access Surgery at WLH
Anesthesia in Laparoscopic Surgery in India
Final Presentation General Medicine 03-08-2024.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
human mycosis Human fungal infections are called human mycosis..pptx
Chinmaya Tiranga quiz Grand Finale.pdf
A systematic review of self-coping strategies used by university students to ...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Final Presentation General Medicine 03-08-2024.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
Pharma ospi slides which help in ospi learning
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE

Comp tia security sy0 601 domain 3 implementation

  • 2. www.infosectrain.com | sales@infosectrain.com 01 The latest version of Security+ SY0-601 have 5 Domains: Domain 1.0: Attacks, Threats, and Vulnerabilities (24%) Domain 2.0: Architecture and Design (21%) Domain 3.0: Implementation (25%) Domain 4.0: Operations and Incident Response (16%) Domain 5.0: Governance, Risk, and Compliance (14%) In this blog, we discuss the second domain 3: Implementation
  • 3. www.infosectrain.com | sales@infosectrain.com 02 Implementation D O M A I N 3 For a company’s security program, implementation is critical. It is the point at which a security system or technology comes into being, a new security effort is nothing but a collection of thoughts on a document if it isn’t put into action. In this domain, we cover 9 objectives and their subtopics. The objectives covered in security+ domain 3.0 are listed below. 1. Implement Secure Protocols 2. Implement Host or Application Security Solutions 3. Implement Secure Network Designs 4. Install and Configure Wireless Security Settings 5. Implement Secure Mobile Solutions 6. Apply Cybersecurity Solutions to the Cloud 7. Implement Identity and Account Management Controls 8. Implement Authentication and Authorization Solutions 9. Implement Public Key Infrastructure
  • 4. www.infosectrain.com | sales@infosectrain.com 03 Implement Secure Protocols 01 Cyber attackers can take advantage of insecure protocols to damage data security and the integrity of systems. In this lesson, you’ll learn about some of the protocols and services that provide network hosts with addressing, name resolution, and monitoring. These protocols aren’t as visible as apps like web servers and email servers, but they’re essential for securing networks. This lesson covers two parts: Protocols and Use case. Inside Protocols we learn Domain Name System (DNS), DNS Security Extensions (DNSSEC), Secure Real-time Transport Protocol (SRTP), File Transfer Protocol (FTPS), SSH File Transfer Protocols (SFTP), Understand Simple Network Management Protocol (SNMP) framework, Hypertext Transfer Protocol (HTTP), we can cover email service protocols, secure POP3 (Post Office Protocol v3), Secure IMAP (Internet Message Access Protocol v4). We understand Internet Protocol Security (IPSec) and its 2 Protocols: In Use case part we learn how security protocols work inside this we cover: • Authentication Header (AH) • Encapsulation Security Payload (ESP) • Voice and Video • Time Synchronization • Email and Web • File Transfer • Directory Services • Remote Access • Domain Name Resolution • Routing and Switching • Network Address Allocation • Subscription Services
  • 5. www.infosectrain.com | sales@infosectrain.com 04 Implement Host or Application Security Solutions 02 This lesson is concentrated on which security solutions are implemented for various hosts and applications. Inside this lesson, we cover Endpoint Protection, Boot Integrity, Application Security, Hardening. In Endpoint Protection we can understand Antivirus and Anti- Malware, NGFW (Next-generation firewall), Host-based intrusion detection system (HIDS), Endpoint detection and response (EDR), Data Loss Prevention (DLP). Boot Integrity covers Boot Security, Unified Extension Firmware Interface (UEFI), work of Measured boot and Boot Attestation. Inside Application security we learn Input Validation, Secure Cookies, HTTP Headers, we understand Allow list, Block list, Dynamic Code analysis.
  • 6. www.infosectrain.com | sales@infosectrain.com 05 Implement Secure Network Designs 03 Networks are as prevalent in the business as computers themselves. As a result, understanding secure network designs is essential for creating a protected network for your company. In this lesson we understand the working of Load balancing, Network segmentation, Virtual local area network (VLAN), we learn the difference between Extranet and Intranet. Cover the working of VPN (Virtual Private Network), DNA, also cover Network access control (NAC), Access control list (ACL). We will also understand the use of Port security.
  • 7. www.infosectrain.com | sales@infosectrain.com 06 Install and Configure Wireless Security Settings 04 Wireless security is becoming very important in the field of information security. In this lesson, we learn Cryptographic protocols, WiFi protected Access 2 (WAP2) and WiFi protected access 3 (WAP3), Simultaneous Authentication of Equals (SAE). We also cover Authentication protocols, Extensible authentication protocol (EAP), Protected Extensible Authentication Protocol (PEAP), IEEE 802.1X. We understand the Methods of configuring wireless security and Installation considerations, WiFi Protected Setup (WPS), Site surveys, WiFi analyzers, Wireless access point (WAP) placement.
  • 8. www.infosectrain.com | sales@infosectrain.com 07 Implement Secure Mobile Solutions 05 In this lesson, we will understand the concept of Connection methods and receivers. Inside this concept, we cover Cellular, WiFi, Bluetooth, NFC, Infrared, Point to Point, Point to multipoint. We learn Mobile device management (MDM), Application management, Content management, Remote wipe, Geofencing, Screen lock, Biometrics, Storage segmentation. We cover Deployment models, BYOD (Bring your own device), Corporate-owned personally enabled (COPE), Choose your own device (CYOD), Virtual desktop infrastructure (VDI).
  • 9. www.infosectrain.com | sales@infosectrain.com 08 Apply Cybersecurity Solutions to the Cloud 06 In this lesson, we will learn the use of Cloud security controls, Cybersecurity solutions, and Cloud-native controls vs third-party solutions. In Cloud Security controls we will cover several sub-topics like High availability across zones, Storage, Network, Compute. And inside Cybersecurity solutions, we cover Application security, Next-generation secure web gateway (SWG), Firewall considerations in a cloud environment.
  • 10. www.infosectrain.com | sales@infosectrain.com 09 Implement Identity and Account Management Controls 07 In this lesson, we will learn 3 topics: Identity, Account types, and Account policies. In the first topic Identity, we cover Identity providers (IdP), know about Identity Attributes, how the tokens are used, SSH keys, and Smart cards. In the second topic, we cover types of accounts, User account, Guest accounts, Service accounts. Inside Account policies, we cover Account permissions, Access policies, Password complexity, Time-based logins, Account audits.
  • 11. www.infosectrain.com | sales@infosectrain.com 10 Implement Authentication and Authorization Solutions 08 In this lesson, we will learn Authentication management, Password keys, Password vaults, TPM, Knowledge-based authentication. We will cover Authentication/authorization, inside this topic we will understand Challenge-Handshake Authentication Protocol (CHAP), Password Authentication Protocol (PAP), Terminal Access Controller Access Control System Plus (TACACS+), Kerberos, OpenID. We also cover Access control schemes and their subtopics Attribute-based access control (ABAC), Role-based access control, Rule-based access control, Privileged access management, Filesystem permissions.
  • 12. www.infosectrain.com | sales@infosectrain.com 11 Implement Public Key Infrastructure 09 In this lesson, we will cover the concept of Public key infrastructure (PKI), Key management, Certificate authority (CA), Certificate revocation list (CRL), use of Certificate attributes, Online Certificate Status Protocol (OCSP), Certificate signing request (CSR). We learn types of certificates, Wildcard, Subject alternative name, Code signing, Domain Validation, Extended validation. We also cover formats of certification and Concepts of certification changing, Key escrow, online vs offline CA.